• Title/Summary/Keyword: Key Curve

Search Result 523, Processing Time 0.024 seconds

Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

  • He, Debiao
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.482-484
    • /
    • 2012
  • With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others' protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.

Helical gear multi-contact tooth mesh load analysis with flexible bearings and shafts

  • Li, Chengwu;He, Yulin;Ning, Xianxiong
    • Structural Engineering and Mechanics
    • /
    • v.55 no.4
    • /
    • pp.839-856
    • /
    • 2015
  • A multi-contact tooth meshing model for helical gear pairs considering bearing and shaft deformations is proposed. First, to easily incorporate into the system model, the complicated Harris' bearing force-displacement relationship is simplified applying a linear least square curve fit. Then, effects of shaft and bearing flexibilities on the helical gear meshing behavior are implemented through transformation matrices which contain the helical gear orientation and spatial displacement under loads. Finally, true contact lines between conjugated teeth are approximated applying a modified meshing equation that includes the influence of tooth flank displacement on the tooth contact induced by shaft and bearing displacements. Based on the model, the bearing's force-displacement relation is examined, and the effects of shaft deformation and external load on the multi-contact tooth mesh load distribution are also analyzed. The advantage of this work is, unlike previous works to search true contact lines through time-consuming iterative strategy, to determine true contact lines between conjugated teeth directly with presentation of deformations of bearings and shafts.

Compressive stress-strain behavior of RFAC after high temperature

  • Liang, Jiongfeng;Wang, Liuhaoxiang;Ling, Zhibin;Li, Wei;Yang, Wenrui
    • Computers and Concrete
    • /
    • v.30 no.1
    • /
    • pp.9-17
    • /
    • 2022
  • This paper discusses the effect of high temperatures (Ts) on the compressive strength and stress-strain curve of recycled fine aggregate concrete (RFAC), based on the experimental results. A total of 90 prisms (100 mm×100 mm×300 mm) were tested. The results show that the compressive strength and elastic modulus of RFAC specimens decreased significantly with increasing T values. As T increased, the strain corresponding to peak stress decreased first when T<200℃ and then increased afterwards. With increasing T values, the stress-strain curves became flat gradually, the peak stress dropped gradually, and εp decreased when T<200℃ and increased in the T range of 400-800℃. A stress-strain relations for RFAC exposed to high Ts is proposed, which agree quite well with the test results and may be used to practical applications.

Diagnostic Accuracy of 18F-FDG-PET in Patients with Testicular Cancer: a Meta-analysis

  • Zhao, Jing-Yi;Ma, Xue-Lei;Li, Yan-Yan;Zhang, Bing-Lan;Li, Min-Min;Ma, Xue-Lei;Liu, Lei
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.8
    • /
    • pp.3525-3531
    • /
    • 2014
  • Objective: Fluorine-18-fluorodeoxyglucose positron emission tomography (18F-FDG-PET) is a new technique for identifying different malignant tumors using different uptake values between tumor cells and normal tissues. Here we assessed the diagnostic accuracy of 18F-FDG-PET in patients with testicular cancer by pooling data of existing trials in a meta-analysis. Methods: PubMed/MEDLINE, Embase and Cochrane Central Trials databases were searched and studies published in English relating to the diagnostic value of FDG-PET for testicular cancer were collected. The summary receiver operating characteristic (SROC) curve was used to examine the FDG-PET accuracy. Results: A total of 16 studies which included 957 examinations in 807 patients (median age, 31.1 years) were analyzed. A meta-analysis was performed to combine the sensitivity and specificity and their 95% confidence intervals (CIs), from diagnostic odds ratio (DOR), positive likelihood ratios (PLR), negative likelihood ratio (NLR). SROC were derived to demonstrate the diagnostic accuracy of FDG-PET for testicular cancer. The pooled sensitivity and specificity were 0.75 (95% confidence interval (CI), 0.70-0.80) and 0.87 (95% CI, 0.84-0.89), respectively. The pooled DOR was 35.6 (95% CI, 12.9-98.3). The area under the curve (AUC) was 0.88. The pooled PLR and pooled NLR were 7.80 (95% CI, 3.73-16.3) and 0.31 (95% CI, 0.23-0.43), respectively. Conclusion: In patients with testicular cancer, 18F-FDG-PET demonstrated a high SROC area, and could be a potentially useful tool if combined with other imaging methods such as MRI and CT. Nevertheless, the literature focusing on the use of 18F-FDG-PET in this setting still remains limited.

A Study of Key Distribution for Security on VANET (VANET에서 보안성 향상을 위한 키 분배에 관한 연구)

  • Too, Do Kyeong;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2192-2198
    • /
    • 2012
  • VANET is a network environment which provides the communication between vehicles and between vehicle and RSU using wireless communication. VANET is very important to protect safety and life of people. Because of that, security is considered enough and certification is very important when messages exchanged between vehicles. Recently, Zhang proposed using Diffie-Hellman key exchange protocol that is method exchanging messages in VANET system through RAISE. But this is many problems on weakness from various attacks. In this paper, proposed the method that establish symmetric key using ECDH key exchange protocol and confirm safety and time spending that generate key and exchange through comparison.

Enhanced Simulated Annealing-based Global MPPT for Different PV Systems in Mismatched Conditions

  • Wang, Feng;Zhu, Tianhua;Zhuo, Fang;Yi, Hao;Fan, Yusen
    • Journal of Power Electronics
    • /
    • v.17 no.5
    • /
    • pp.1327-1337
    • /
    • 2017
  • Photovoltaic (PV) systems are influenced by disproportionate impacts on energy production caused by frequent mismatch cases. The occurrence of multiple maximum power points (MPPs) adds complexity to the tracking process in various PV systems. However, current maximum-power point tracking (MPPT) techniques exhibit limited performance. This paper introduces an enhanced simulated annealing (ESA)-based GMPPT technique against multiple MPP issues in P-V curve with different PV system structures. The proposed technique not only distinguishes global and local MPPs but also performs rapid convergence speed and high tracking accuracy of irradiance changing and restart capability detection. Moreover, the proposed global maximum power tracking algorithm can be applied in the central converter of DMPPT and hybrid PV system to meet various application scenarios. Its effectiveness is verified by simulation and test results.

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.

Trajectory tracking control of underactuated USV based on modified backstepping approach

  • Dong, Zaopeng;Wan, Lei;Li, Yueming;Liu, Tao;Zhang, Guocheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.7 no.5
    • /
    • pp.817-832
    • /
    • 2015
  • This paper presents a state feedback based backstepping control algorithm to address the trajectory tracking problem of an underactuated Unmanned Surface Vessel (USV) in the horizontal plane. A nonlinear three Degree of Freedom (DOF) underactuated dynamic model for USV is considered, and trajectory tracking controller that can track both curve trajectory and straight line trajectory with high accuracy is designed as the well known Persistent Exciting (PE) conditions of yaw velocity is completely relaxed in our study. The proposed controller has further been enriched by incorporating an integral action additionally for enhancing the steady state performance and control precision of the USV trajectory tracking control system. Global stability of the overall system is proved by Lyapunov theory and Barbalat's Lemma, and then simulation experiments are carried out to demonstrate the effectiveness of the controller designed.

A Comparative Performance Analysis of Segmentation Models for Lumbar Key-points Extraction (요추 특징점 추출을 위한 영역 분할 모델의 성능 비교 분석)

  • Seunghee Yoo;Minho Choi ;Jun-Su Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.5
    • /
    • pp.354-361
    • /
    • 2023
  • Most of spinal diseases are diagnosed based on the subjective judgment of a specialist, so numerous studies have been conducted to find objectivity by automating the diagnosis process using deep learning. In this paper, we propose a method that combines segmentation and feature extraction, which are frequently used techniques for diagnosing spinal diseases. Four models, U-Net, U-Net++, DeepLabv3+, and M-Net were trained and compared using 1000 X-ray images, and key-points were derived using Douglas-Peucker algorithms. For evaluation, Dice Similarity Coefficient(DSC), Intersection over Union(IoU), precision, recall, and area under precision-recall curve evaluation metrics were used and U-Net++ showed the best performance in all metrics with an average DSC of 0.9724. For the average Euclidean distance between estimated key-points and ground truth, U-Net was the best, followed by U-Net++. However the difference in average distance was about 0.1 pixels, which is not significant. The results suggest that it is possible to extract key-points based on segmentation and that it can be used to accurately diagnose various spinal diseases, including spondylolisthesis, with consistent criteria.

Hardware Design of Elliptic Curve processor Resistant against Simple Power Analysis Attack (단순 전력분석 공격에 대처하는 타원곡선 암호프로세서의 하드웨어 설계)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.143-152
    • /
    • 2012
  • In this paper hardware implementation of GF($2^{191}$) elliptic curve cryptographic coprocessor which supports 7 operations such as scalar multiplication(kP), Menezes-Vanstone(MV) elliptic curve cipher/decipher algorithms, point addition(P+Q), point doubling(2P), finite-field multiplication/division is described. To meet structure resistant against simple power analysis, the ECC processor adopts the Montgomery scalar multiplication scheme which main loop operation consists of the key-independent operations. It has operational characteristics that arithmetic units, such GF_ALU, GF_MUL, and GF_DIV, which have 1, (m/8), and (m-1) fixed operation cycles in GF($2^m$), respectively, can be executed in parallel. The processor has about 68,000 gates and its simulated worst case delay time is about 7.8 ns under 0.35um CMOS technology. Because it has about 320 kbps cipher and 640 kbps rate and supports 7 finite-field operations, it can be efficiently applied to the various cryptographic and communication applications.